First Page | Document Content | |
---|---|---|
Date: 2012-07-04 01:21:00Hashing Preimage attack SHA-1 MD5 NIST hash function competition Collision resistance Crypt HMAC SHA-2 Error detection and correction Cryptography Cryptographic hash functions | The Hitchhiker's Guide to the SHA-3 CompetitionAdd to Reading ListSource URL: www.cs.technion.ac.ilDownload Document from Source WebsiteFile Size: 1,08 MBShare Document on Facebook |